![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Microelectromechanical sytems (MEMS) applications in RF and microwave electronics are revolutionizing wireless communications. This text provides a comprehensive explanation of the fabrication and fundamental physics of MEMS and their applications in electronic communication systems. The book integrates circuit fabrication technology, device design-oriented materials, mechanical and microwave considerations, and RF/microwave electronics to give engineers and managers a clear understanding of the potential and limitations of MEMS in electronic communications.
Persuasive Communication for Science and Technology Leaders Explore this insightful guide to the development of persuasive leadership skills perfect for students and managers in technical fields Many technical managers receive little or no training in the persuasive arts. Though technically skilled, they often lack the ability to engage effectively with an audiences outside their field. Persuasive Communication for Science and Technology Leaders: Writing and Speaking with Confidence delivers a thorough treatment of how to connect with audiences whose knowledge, values, personal experiences, ethnic background, gender, and worldview may differ from their own. Written in a highly readable and entertaining style, this book goes beyond the scope of a standard textbook on persuasive communication. Its practical lessons illustrate the techniques of effective scientific and technical writing while emphasizing values-based leadership for a more just, inclusive, and sustainable world, a theme that seems particularly pertinent during these times of multiple crises, misinformation campaigns, and science denial. The distinguished speaker and author explores the broader importance of language and explains various techniques for expanding your expressive range and your professional influence. He will also teach you methods for conveying information clearly and precisely as well as in ways that inspire and leave a lasting impression. You will also benefit from: A thorough introduction to knowing and connecting with your audience, using voice, tone, and point of view for results, and engaging your reader with compelling openings An exploration of explaining complex technologies clearly, succeeding with challenging writing assignments, and applying a variety of persuasive strategies for agile responses to a rapidly changing world An examination of speaking effectively while thinking on your feet, including how to create a safety net and how to recover from momentary lapses Easy-to-remember guidance on avoiding common language errors that might undermine your credibility or, worse yet, make people stop listening to you Perfect for undergraduate and graduate students in scientific and technical fields such as engineering, geology, botany, climatology, and epidemiology, Persuasive Communication for Science and Technology Leaders: Writing and Speaking with Confidence will earn a place in the libraries of technical managers and leaders who seek to better connect with their audiences.
Wireless Sensor Networks (WSNs) and the Internet of Things are facing tremendous advances both in terms of energy-efficiency as well as in the number of available applications. Consequently, there are challenges that need to be tackled for the future generation of WSNs. After giving an overview of the WSN protocols and IEEE 802.15.4 standard, this book proposes IEEE 802.15.4 Medium Access Control (MAC) sub-layer performance enhancements by employing not only RTS/CTS combined with packet concatenation but also scheduled channel poling (MC-SCP). Results have shown that the use of the RTS/CTS mechanism improves channel efficiency by decreasing the deferral time before transmitting a data packet. Furthermore, the Sensor Block Acknowledgment MAC (SBACK-MAC) protocol enables more efficiency as it allows the aggregation of several acknowledgement responses in one special Block Acknowledgment (BACK) Response packet. The throughput and delay performance have been mathematically derived under both ideal conditions (a channel environment with no transmission errors) and non-ideal conditions (with transmission errors). Simulation results successfully validate the proposed analytical models. This research reveals the importance of an appropriate design for the MAC sub-layer protocol for the desired WSN application. Depending on the mission of the WSN application, different protocols are required. Therefore, the overall performance of a WSN application certainly depends on the development and application of suitable e.g., MAC, network layer protocols.
This book introduces a number of recent developments on connectivity of communication networks, ranging from connectivity of large static networks and connectivity of highly dynamic networks to connectivity of small to medium sized networks. This book also introduces some applications of connectivity studies in network optimization, in network localization, and in estimating distances between nodes. The book starts with an overview of the fundamental concepts, models, tools, and methodologies used for connectivity studies. The rest of the chapters are divided into four parts: connectivity of large static networks, connectivity of highly dynamic networks, connectivity of small to medium sized networks, and applications of connectivity studies.
This timely text/reference presents a comprehensive review of the workflow scheduling algorithms and approaches that are rapidly becoming essential for a range of software applications, due to their ability to efficiently leverage diverse and distributed cloud resources. Particular emphasis is placed on how workflow-based automation in software-defined cloud centers and hybrid IT systems can significantly enhance resource utilization and optimize energy efficiency. Topics and features: describes dynamic workflow and task scheduling techniques that work across multiple (on-premise and off-premise) clouds; presents simulation-based case studies, and details of real-time test bed-based implementations; offers analyses and comparisons of a broad selection of static and dynamic workflow algorithms; examines the considerations for the main parameters in projects limited by budget and time constraints; covers workflow management systems, workflow modeling and simulation techniques, and machine learning approaches for predictive workflow analytics. This must-read work provides invaluable practical insights from three subject matter experts in the cloud paradigm, which will empower IT practitioners and industry professionals in their daily assignments. Researchers and students interested in next-generation software-defined cloud environments will also greatly benefit from the material in the book.
The only way to stop a hacker is to think like one
The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more. In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.
This book describes grouping detection and initiation; group initiation algorithm based on geometry center; data association and track continuity; as well as separate-detection and situation cognition for group-target. It specifies the tracking of the target in different quantities and densities. At the same time, it integrates cognition into the application. Group-target Tracking is designed as a book for advanced-level students and researchers in the area of radar systems, information fusion of multi-sensors and electronic countermeasures. It is also a valuable reference resource for professionals working in this field.
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.
This is the first book to explore how Semantic Web technologies (SWTs) can be used to create intelligent engineering applications (IEAs). Technology-specific chapters reflect the state of the art in relevant SWTs and offer guidelines on how they can be applied in multi-disciplinary engineering settings characteristic of engineering production systems. In addition, a selection of case studies from various engineering domains demonstrate how SWTs can be used to create IEAs that enable, for example, defect detection or constraint checking. Part I "Background and Requirements of Industrie 4.0 for Semantic Web Solutions" provides the background information needed to understand the book and addresses questions concerning the semantic challenges and requirements of Industrie 4.0, and which key SWT capabilities may be suitable for implementing engineering applications. In turn, Part II "Semantic Web-Enabled Data Integration in Multi-Disciplinary Engineering" focuses on how SWTs can be used for data integration in heterogeneous, multi-disciplinary engineering settings typically encountered in the creation of flexible production systems. Part III "Creating Intelligent Applications for Multi-Disciplinary Engineering" demonstrates how the integrated engineering data can be used to support the creation of IEAs, while Part IV "Related and Emerging Trends in the Use of Semantic Web in Engineering" presents an overview of the broader spectrum of approaches that make use of SWTs to support engineering settings. A final chapter then rounds out the book with an assessment of the strengths, weaknesses and compatibilities of SWTs and an outlook on future opportunities for applying SWTs to create IEAs in flexible industrial production systems. This book seeks to build a bridge between two communities: industrial production on one hand and Semantic Web on the other. Accordingly, stakeholders from both communities should find this book useful in their work. Semantic Web researchers will gain a better understanding of the challenges and requirements of the industrial production domain, offering them guidance in the development of new technologies and solutions for this important application area. In turn, engineers and managers from engineering domains will arrive at a firmer grasp of the benefits and limitations of using SWTs, helping them to select and adopt appropriate SWTs more effectively. In addition, researchers and students interested in industrial production-related issues will gain valuable insights into how and to what extent SWTs can help to address those issues.
This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.
This book discusses harnessing the real power of cloud computing in optimization problems, presenting state-of-the-art computing paradigms, advances in applications, and challenges concerning both the theories and applications of cloud computing in optimization with a focus on diverse fields like the Internet of Things, fog-assisted cloud computing, and big data. In real life, many problems - ranging from social science to engineering sciences - can be identified as complex optimization problems. Very often these are intractable, and as a result researchers from industry as well as the academic community are concentrating their efforts on developing methods of addressing them. Further, the cloud computing paradigm plays a vital role in many areas of interest, like resource allocation, scheduling, energy management, virtualization, and security, and these areas are intertwined with many optimization problems. Using illustrations and figures, this book offers students and researchers a clear overview of the concepts and practices of cloud computing and its use in numerous complex optimization problems.
The advancement of technology is a standard of modern daily life, whether it be the release of a new cellphone, computer, or a self-driving car. Due to this constant advancement, the networks on which these technologies operate must advance as well. Innovations in Software-Defined Networking and Network Functions Virtualization is a critical scholarly publication that observes the advances made in network infrastructure through achieving cost efficacy while maintaining maximum flexibility for the formation and operation of these networks. Featuring coverage on a broad selection of topics, such as software-defined storage, openflow controller, and storage virtualization, this publication is geared toward professionals, computer engineers, academicians, students, and researchers seeking current and relevant research on the advancements made to network infrastructures.
Technology has become deeply integrated into modern society and various activities throughout everyday life. However, this increases the risk of vulnerabilities, such as hacking or system errors, among other online threats. Cybersecurity Breaches and Issues Surrounding Online Threat Protection is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology.
This book covers various algorithmic developments in the perfect reconstruction cosine/sine-modulated filter banks (TDAC-MDCT/MDST or MLT, MCLT, low delay MDCT, complex exponential/cosine/sine-modulated QMF filter banks), and near-perfect reconstruction QMF banks (pseudo-QMF banks) in detail, including their general mathematical properties, matrix representations, fast algorithms and various methods to integer approximations being recently a new transform technology for lossless audio coding. Each chapter will contain a number of examples and will conclude with problems and exercises. The book reflects the research efforts/activities and achieved results of the authors in the time period over the last 20 years.
Here's the first focused discussion of issues and technology in developing networked multimedia systems. This book includes a unique explanation of color specification and its role in achieving high picture quality, high compression ratio and high information retrieval performance, plus valuable coverage of principles and techniques of multimedia information indexing and retrieval critical for future systems.
Broadband technology is ushering the telecom industry through a unique period of change with profound business implications for suppliers and users. This single source describes the four major broadband technologies that are shaping telecommunications networks: frame relay; optical fiber (including SONET); distributed queue dual bus (DQDB); and asynchronous transfer mode (ATM).
Mass customization and personalization are widely appreciated as viable and promising strategies which aim to provide products and services that best serve individuals' personal needs with near mass production efficiency. ""Mass Customization for Personalized Communication Environments: Integrating Human Factors"" focuses on the customization of services and communication environments to advance user satisfaction and provide a total redefinition of the way goods and services are created or sold and customers and vendors interact. This authoritative collection of chapters offers relevant theoretical foundations, principles, methodologies, frameworks, and best practices within the field of research.
This book contains refereed papers from the 13th International Conference on GeoComputation held at the University of Texas, Dallas, May 20-23, 2015. Since 1996, the members of the GeoComputation (the art and science of solving complex spatial problems with computers) community have joined together to develop a series of conferences in the United Kingdom, New Zealand, Australia, Ireland and the United States of America. The conference encourages diverse topics related to novel methodologies and technologies to enrich the future development of GeoComputation research.
Network security has quickly become an area of primary concern in the world of telecommunications. This easy-to-understand book introduces professionals to fundamental network security concepts, principles, and terms, while providing practical techniques that can be applied on the job. It helps identify the best type of intrusion detection system for a particular environment, develop organizational guidelines for passwords, set general computer security policies, and perform a security review and risk assessment.
Readers seeking to gain a handle on the internet's global expansion will find this book rich in scholarly foundations combined with cutting-edge discussion of emerging ICTs and services and the complex societal contexts in which they are embedded. To explore possibilities to the fullest extent, a sociotechnical systems approach is employed, focusing on the interplay of technical, social, cultural, political, and economic dynamics to explore alternative futures (ones that are not part of the dominant discourse about the internet). These shared perspectives are not well addressed elsewhere in current discussions. Awareness of these dynamics, and the fluidity of the future, is important, as humankind moves forward into the uncertain future. Due to the sociotechnical complexity of the Internet, policymakers, businesspeople, and academics worldwide have struggled to keep abreast of developments. This volume's approach is intended to stimulate dialogue between academics and practitioners on a topic that will affect most aspects of human life in the near-term future. |
You may like...
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd
Paperback
R2,283
Discovery Miles 22 830
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,452
Discovery Miles 14 520
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, …
Hardcover
R7,752
Discovery Miles 77 520
|